Homepage SharITSec

Featured Post

Cyber Kill Chain Explained

Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any fl...

Sp123 23 Mar, 2026

Latest Posts

Cyber Kill Chain Explained

Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any fl...

Sp123 23 Mar, 2026

ChatGPT confessions: AI’s role in personal lives

People increasingly turn to ChatGPT and generative AI for deeply personal matters , from venting emotions to seeking therapy-like advice. O...

Sp123 23 Mar, 2026

This is all it takes to stop a train (Lock and Code S07E06)

This week on the Lock and Code podcast… Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off ...

Sp123 22 Mar, 2026

Lessons from the Stryker Incident

The Stryker incident demonstrates how attackers can leverage Microsoft Entra ID and Intune as destructive control planes, wiping devices and...

Sp123 22 Mar, 2026

북한 김수키(Kimsuky)에서 만든 악성코드-a.js(가칭)

오늘은 북한 김수키(Kimsuky)에서 만든 악성코드인 a.js(가칭) 에 대해 알아보겠습니다.파일명: a.js사이즈: 1 MBMD5: 927d3b32a981e6fed96c07a46ab1904eSHA-1: 97ab16b075fc1e6d9017a4a51...

Sp123 22 Mar, 2026

T1547.002 Authentication Package in MITRE ATT&CK Explained

Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any fl...

Sp123 22 Mar, 2026

How to Solve Tool Sprawl in the SOC

A Practical Technical and Strategic Guide Tool sprawl in the Security Operations Center is no longer a side issue that can be discussed as...

Sp123 21 Mar, 2026

One Commit Away from Theft: When Supply Chain Attacks Hit the Crypto Ecosystem

Explore patterns observed across real-world crypto incidents and controlled adversary exercises, along with a containment-first defense road...

Sp123 21 Mar, 2026